1.0 Introduction
Recently, Fortinet has released security updates to address multiple high-severity vulnerabilities in Fortinet products.
2.0 Impact
A cyber threat actor could exploit this vulnerability to take control of an affected system.
3.0 Affected Products
- FG-IR-23-353: Cross Site Request Forgery in admin endpoint
- FG-IR-23-117: Exposure of Sensitive Information to an Unauthorized Actor
- FG-IR-24-261: Incorrect authorization in GUI console
- FG-IR-24-178: Multiple command injection on CLI
- FG-IR-24-325: Multiple format string vulnerabilities
- FG-IR-24-306: OS command injection on VM download feature
- FG-IR-24-327: Use of hardcoded key used for remote backup server password encryption
- FG-IR-23-216: XXS flaw in Fortiview/SecurityLogs pages
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the
Fortinet Security Updates for Multiple Products
and apply necessary updates. Kindly refer to the following URL:
- FG-IR-23-353: Cross Site Request Forgery in admin endpoint: https://fortiguard.fortinet.com/psirt/FG-IR-23-353
- FG-IR-23-117: Exposure of Sensitive Information to an Unauthorized Actor: https://fortiguard.fortinet.com/psirt/FG-IR-23-117
- FG-IR-24-261: Incorrect authorization in GUI console: https://fortiguard.fortinet.com/psirt/FG-IR-24-261
- FG-IR-24-178: Multiple command injection on CLI: https://fortiguard.fortinet.com/psirt/FG-IR-24-178
- FG-IR-24-325: Multiple format string vulnerabilities: https://fortiguard.fortinet.com/psirt/FG-IR-24-325
- FG-IR-24-306: OS command injection on VM download feature: https://fortiguard.fortinet.com/psirt/FG-IR-24-306
- FG-IR-24-327: Use of hardcoded key used for remote backup server password encryption: https://fortiguard.fortinet.com/psirt/FG-IR-24-327
- FG-IR-23-216: XXS flaw in Fortiview/SecurityLogs pages: https://fortiguard.fortinet.com/psirt/FG-IR-23-216
Generally, we advise the users of the devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web:
https://www.mycert.org.my
5.0 References
- https://www.fortiguard.com/psirt
- https://fortiguard.fortinet.com/psirt/FG-IR-23-216
- https://fortiguard.fortinet.com/psirt/FG-IR-24-327
- https://fortiguard.fortinet.com/psirt/FG-IR-24-306
- https://fortiguard.fortinet.com/psirt/FG-IR-24-325
- https://fortiguard.fortinet.com/psirt/FG-IR-24-178
- https://fortiguard.fortinet.com/psirt/FG-IR-24-261
- https://fortiguard.fortinet.com/psirt/FG-IR-23-353
- https://fortiguard.fortinet.com/psirt/FG-IR-23-117